275 related articles for article (PubMed ID: 8188408)
21. A legal examination of computerized health information.
Robinson DM
Health Law Can; 1993; 14(2):40-6. PubMed ID: 10131253
[No Abstract] [Full Text] [Related]
22. EMR confidentiality and information security.
Kurtz G
J Healthc Inf Manag; 2003; 17(3):41-8. PubMed ID: 12858596
[TBL] [Abstract][Full Text] [Related]
23. Health information, privacy, confidentiality and ethics.
Kluge EH
Int J Biomed Comput; 1994 Feb; 35 Suppl():23-7. PubMed ID: 8188418
[TBL] [Abstract][Full Text] [Related]
24. [Patient records on "smart cards"--security is needed].
Klein G
Lakartidningen; 1991 Oct; 88(44):3637. PubMed ID: 1943376
[No Abstract] [Full Text] [Related]
25. Smart cards are set to revolutionize health care.
Healthc Benchmarks; 1998 Jan; 5(1):9-12. PubMed ID: 10176059
[No Abstract] [Full Text] [Related]
26. Australian healthcare: a smart card for a clever country.
Morris S; Cooper J; Bomba D; Brankovic L; Miller M; Pacheco F
Int J Biomed Comput; 1995 Oct; 40(2):101-5. PubMed ID: 8847116
[TBL] [Abstract][Full Text] [Related]
27. Is the future in the cards?
Dakins DR
Health Data Manag; 2001 Jul; 9(7):44-8. PubMed ID: 11464725
[TBL] [Abstract][Full Text] [Related]
28. The need for security--a clinical view.
France FH; Gaunt PN
Int J Biomed Comput; 1994 Feb; 35 Suppl():189-94. PubMed ID: 8188413
[TBL] [Abstract][Full Text] [Related]
29. How can the German Electronic Health Card support patient's role in care management.
Pharow P; Blobel B; Hildebrand C
Stud Health Technol Inform; 2008; 137():386-401. PubMed ID: 18560101
[TBL] [Abstract][Full Text] [Related]
30. Security savvy. Midwest healthcare system secures patient information with two-factor authentication.
Slabodnick D
Health Manag Technol; 2002 May; 23(5):32-3. PubMed ID: 12016710
[No Abstract] [Full Text] [Related]
31. New possibilities for patient information storage in a technological age.
Schoenfelt S
J AHIMA; 1998 Sep; 69(8):50-4. PubMed ID: 10182508
[TBL] [Abstract][Full Text] [Related]
32. Medical records, 2: security and confidentiality.
Last J
Ann R Coll Physicians Surg Can; 1994 Feb; 27(1):8-9. PubMed ID: 15362241
[No Abstract] [Full Text] [Related]
33. Benefits and weaknesses of health cards used in health information systems.
Pharow P; Blobel B
Stud Health Technol Inform; 2006; 124():320-5. PubMed ID: 17108543
[TBL] [Abstract][Full Text] [Related]
34. Patient identification: the Achilles heel of computerized health information.
Gabler J
Health Manag Technol; 1996 Mar; 17(3):98, 91. PubMed ID: 10156420
[No Abstract] [Full Text] [Related]
35. A computational model to protect patient data from location-based re-identification.
Malin B
Artif Intell Med; 2007 Jul; 40(3):223-39. PubMed ID: 17544262
[TBL] [Abstract][Full Text] [Related]
36. Health Cards '97.
Stud Health Technol Inform; 1997; 49():v-xii, 1-414. PubMed ID: 10178822
[No Abstract] [Full Text] [Related]
37. Guarding patient confidentiality under managed care.
Walker LM
Med Econ; 1997 May; 74(10):155-6, 159-62, 168-70 passim. PubMed ID: 10167105
[No Abstract] [Full Text] [Related]
38. How secure is the Internet for healthcare applications?
Campbell LA
Radiol Manage; 1996; 18(1):28-32. PubMed ID: 10154332
[TBL] [Abstract][Full Text] [Related]
39. Electronic records and signatures in health care and the interplay of E-SIGN (Electronic Signatures in Global and National Commerce Act), HIPAA, and UETA (Uniform Electronic Transactions Act).
McNelis D; Helbling C
Health Care Law Mon; 2000 Oct; ():3-9. PubMed ID: 11142227
[No Abstract] [Full Text] [Related]
40. Press release: European community to use Smart Patient Cards.
Seidman S
J Med Syst; 1990 Jun; 14(3):158-9. PubMed ID: 2266333
[No Abstract] [Full Text] [Related]
[Previous] [Next] [New Search]